Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-10-2022 18:07

General

  • Target

    16346ed15b2d60e072d99cd110e29c8bef43483b9f8a5f9246123750bc0073d6.exe

  • Size

    626KB

  • MD5

    031281aa0667cba260ddad6f77c89ccd

  • SHA1

    17b747e3e1de9296f862d522a9664046d2d3469e

  • SHA256

    16346ed15b2d60e072d99cd110e29c8bef43483b9f8a5f9246123750bc0073d6

  • SHA512

    f4715533c2f535964dc98f581887abc1a9daf68f913b9b316762ddf169b4209458fbeebed8173fca65c7d4732087bf0b0e4369fa440cebd45772d77559820ea2

  • SSDEEP

    12288:bItKcNGvH3x+D0NDO6D7zkoT+lqp/7Iu/O2ybZx9Y9rl7jjGHS:bItK9H3xbJZlT+lQTD/O3BArRCHS

Malware Config

Extracted

Family

formbook

Campaign

henz

Decoy

IxWMb+jVsoinShuZJzk=

TPfKgQZ//oGnKr/J

EsK0WxD5kY65XOW1Td/5CxSUpCUytR7M

KebSmiCP9p8yUw==

HAt/ljkEuqMLHOLCi53Pv8MKX9qk

CY4ogZTwJc4vSw==

WWDIx5UYUDyepntE0YIAPca3/rI=

+Pkr01Lfb2rME7bL

S5nyK0p8jS2xdwQ=

W/oqvlO57LfkLcLHnQ==

zrrwtqkTLwxulm4l8FGopw==

AqucYext8bzFbOKthIm8E6gfVkUHxKY=

OfnjeDs78+RTcz4OHRl+

XKf1wwpZR5hLLjHgmUGOpQ==

JMyhSLoJPTCwn5o9zX2d8i1+

Wk54MBsDhWSVbnIRkQ==

7aaYR/tOhh9piTw5/KHSRwuK2iqgafw7pQ==

hH/EYxN+jC2xdwQ=

S0F4ORqDjS2xdwQ=

0o/UwXnuJ+sJp0cOHRl+

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2756
    • C:\Users\Admin\AppData\Local\Temp\16346ed15b2d60e072d99cd110e29c8bef43483b9f8a5f9246123750bc0073d6.exe
      "C:\Users\Admin\AppData\Local\Temp\16346ed15b2d60e072d99cd110e29c8bef43483b9f8a5f9246123750bc0073d6.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3272
      • C:\Users\Admin\AppData\Local\Temp\mwfkiq.exe
        "C:\Users\Admin\AppData\Local\Temp\mwfkiq.exe" "C:\Users\Admin\AppData\Local\Temp\vqclxetbtm.au3"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:804
        • C:\Users\Admin\AppData\Local\Temp\mwfkiq.exe
          "C:\Users\Admin\AppData\Local\Temp\mwfkiq.exe" "C:\Users\Admin\AppData\Local\Temp\vqclxetbtm.au3"
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:4664
    • C:\Windows\SysWOW64\cscript.exe
      "C:\Windows\SysWOW64\cscript.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2204
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:4928

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\ispif.hre

      Filesize

      185KB

      MD5

      3cfd2fc4bace3b7a026ea386367aeb1c

      SHA1

      d8c09c5809ae2c09dccd6790bc3f57fa4bc42735

      SHA256

      75a663272a1cb4a66a727653d4128459844b3f407dc4366d65431331a00c3d5c

      SHA512

      1023861a2312e5b1607ff99ec0f5061502965339ee21c5719eb74081fe5820538f750ed45158b58cab6e2d27784a1c25e7b6325dfb1590fb97348db3bddf57c2

    • C:\Users\Admin\AppData\Local\Temp\mwfkiq.exe

      Filesize

      925KB

      MD5

      0adb9b817f1df7807576c2d7068dd931

      SHA1

      4a1b94a9a5113106f40cd8ea724703734d15f118

      SHA256

      98e4f904f7de1644e519d09371b8afcbbf40ff3bd56d76ce4df48479a4ab884b

      SHA512

      883aa88f2dba4214bb534fbdaf69712127357a3d0f5666667525db3c1fa351598f067068dfc9e7c7a45fed4248d7dca729ba4f75764341e47048429f9ca8846a

    • C:\Users\Admin\AppData\Local\Temp\mwfkiq.exe

      Filesize

      925KB

      MD5

      0adb9b817f1df7807576c2d7068dd931

      SHA1

      4a1b94a9a5113106f40cd8ea724703734d15f118

      SHA256

      98e4f904f7de1644e519d09371b8afcbbf40ff3bd56d76ce4df48479a4ab884b

      SHA512

      883aa88f2dba4214bb534fbdaf69712127357a3d0f5666667525db3c1fa351598f067068dfc9e7c7a45fed4248d7dca729ba4f75764341e47048429f9ca8846a

    • C:\Users\Admin\AppData\Local\Temp\mwfkiq.exe

      Filesize

      925KB

      MD5

      0adb9b817f1df7807576c2d7068dd931

      SHA1

      4a1b94a9a5113106f40cd8ea724703734d15f118

      SHA256

      98e4f904f7de1644e519d09371b8afcbbf40ff3bd56d76ce4df48479a4ab884b

      SHA512

      883aa88f2dba4214bb534fbdaf69712127357a3d0f5666667525db3c1fa351598f067068dfc9e7c7a45fed4248d7dca729ba4f75764341e47048429f9ca8846a

    • C:\Users\Admin\AppData\Local\Temp\sxvuoazn.heb

      Filesize

      40KB

      MD5

      4b48ae58eb0a611ee3be6370c8b16c3f

      SHA1

      67065f7d57704bef238590ae76ad060c29470dfa

      SHA256

      394e96cda29cfffff3a9f4ef1e8b2e1751bf22e351d048c374ee8b088172094e

      SHA512

      a71320b300e23da49b25c0d9875d80e18c9a68660f5616b174ffa3a7b9ecef25418b28a2338a1b8133292600e3826282c9e352d50269f4acd9ad4b941632c06c

    • C:\Users\Admin\AppData\Local\Temp\vqclxetbtm.au3

      Filesize

      9KB

      MD5

      528e53c721e9a9ddd2b963098da47a1b

      SHA1

      6e7b4d8a92b14ce4fbbe6eb4ca93b12dd120ae24

      SHA256

      bcbef065142b2fffd5baa3ce19f0ca347451f2d75cfbea9e3e9cc323c678edd6

      SHA512

      3c42df1b911768497f2822189ff999f229a904ced51a7e1c8355e73c1e30f4b8fc8ddcca584dccc9a6f482d0f48fb6dece54a73a95eec0c9506e25b5189e4d7c

    • memory/2204-152-0x0000000002690000-0x000000000271F000-memory.dmp

      Filesize

      572KB

    • memory/2204-151-0x00000000003C0000-0x00000000003ED000-memory.dmp

      Filesize

      180KB

    • memory/2204-149-0x0000000002760000-0x0000000002AAA000-memory.dmp

      Filesize

      3.3MB

    • memory/2204-150-0x00000000003C0000-0x00000000003ED000-memory.dmp

      Filesize

      180KB

    • memory/2204-148-0x0000000000650000-0x0000000000677000-memory.dmp

      Filesize

      156KB

    • memory/2756-164-0x0000000002FC0000-0x0000000002FD0000-memory.dmp

      Filesize

      64KB

    • memory/2756-170-0x0000000002FC0000-0x0000000002FD0000-memory.dmp

      Filesize

      64KB

    • memory/2756-196-0x0000000007B60000-0x0000000007B70000-memory.dmp

      Filesize

      64KB

    • memory/2756-195-0x0000000007B60000-0x0000000007B70000-memory.dmp

      Filesize

      64KB

    • memory/2756-194-0x0000000002FC0000-0x0000000002FD0000-memory.dmp

      Filesize

      64KB

    • memory/2756-193-0x0000000002FC0000-0x0000000002FD0000-memory.dmp

      Filesize

      64KB

    • memory/2756-192-0x0000000002FC0000-0x0000000002FD0000-memory.dmp

      Filesize

      64KB

    • memory/2756-191-0x0000000002FC0000-0x0000000002FD0000-memory.dmp

      Filesize

      64KB

    • memory/2756-153-0x0000000003320000-0x0000000003404000-memory.dmp

      Filesize

      912KB

    • memory/2756-154-0x0000000003320000-0x0000000003404000-memory.dmp

      Filesize

      912KB

    • memory/2756-155-0x0000000002FC0000-0x0000000002FD0000-memory.dmp

      Filesize

      64KB

    • memory/2756-156-0x0000000002FC0000-0x0000000002FD0000-memory.dmp

      Filesize

      64KB

    • memory/2756-157-0x0000000002FC0000-0x0000000002FD0000-memory.dmp

      Filesize

      64KB

    • memory/2756-158-0x0000000002FC0000-0x0000000002FD0000-memory.dmp

      Filesize

      64KB

    • memory/2756-159-0x0000000002FC0000-0x0000000002FD0000-memory.dmp

      Filesize

      64KB

    • memory/2756-160-0x0000000002FC0000-0x0000000002FD0000-memory.dmp

      Filesize

      64KB

    • memory/2756-161-0x0000000002FC0000-0x0000000002FD0000-memory.dmp

      Filesize

      64KB

    • memory/2756-165-0x0000000002FC0000-0x0000000002FD0000-memory.dmp

      Filesize

      64KB

    • memory/2756-166-0x0000000002FC0000-0x0000000002FD0000-memory.dmp

      Filesize

      64KB

    • memory/2756-143-0x0000000002FD0000-0x00000000030A3000-memory.dmp

      Filesize

      844KB

    • memory/2756-163-0x0000000002FC0000-0x0000000002FD0000-memory.dmp

      Filesize

      64KB

    • memory/2756-162-0x0000000002FC0000-0x0000000002FD0000-memory.dmp

      Filesize

      64KB

    • memory/2756-167-0x0000000002FC0000-0x0000000002FD0000-memory.dmp

      Filesize

      64KB

    • memory/2756-168-0x0000000002FC0000-0x0000000002FD0000-memory.dmp

      Filesize

      64KB

    • memory/2756-169-0x0000000002FC0000-0x0000000002FD0000-memory.dmp

      Filesize

      64KB

    • memory/2756-190-0x0000000002FC0000-0x0000000002FD0000-memory.dmp

      Filesize

      64KB

    • memory/2756-171-0x0000000002FC0000-0x0000000002FD0000-memory.dmp

      Filesize

      64KB

    • memory/2756-172-0x0000000003490000-0x00000000034A0000-memory.dmp

      Filesize

      64KB

    • memory/2756-173-0x0000000008300000-0x0000000008310000-memory.dmp

      Filesize

      64KB

    • memory/2756-174-0x0000000008300000-0x0000000008310000-memory.dmp

      Filesize

      64KB

    • memory/2756-175-0x0000000008300000-0x0000000008310000-memory.dmp

      Filesize

      64KB

    • memory/2756-176-0x0000000008300000-0x0000000008310000-memory.dmp

      Filesize

      64KB

    • memory/2756-177-0x0000000002FC0000-0x0000000002FD0000-memory.dmp

      Filesize

      64KB

    • memory/2756-178-0x0000000002FC0000-0x0000000002FD0000-memory.dmp

      Filesize

      64KB

    • memory/2756-179-0x0000000002FC0000-0x0000000002FD0000-memory.dmp

      Filesize

      64KB

    • memory/2756-180-0x0000000002FC0000-0x0000000002FD0000-memory.dmp

      Filesize

      64KB

    • memory/2756-181-0x0000000002FC0000-0x0000000002FD0000-memory.dmp

      Filesize

      64KB

    • memory/2756-182-0x0000000002FC0000-0x0000000002FD0000-memory.dmp

      Filesize

      64KB

    • memory/2756-183-0x0000000002FC0000-0x0000000002FD0000-memory.dmp

      Filesize

      64KB

    • memory/2756-184-0x0000000002FC0000-0x0000000002FD0000-memory.dmp

      Filesize

      64KB

    • memory/2756-185-0x0000000002FC0000-0x0000000002FD0000-memory.dmp

      Filesize

      64KB

    • memory/2756-186-0x0000000002FC0000-0x0000000002FD0000-memory.dmp

      Filesize

      64KB

    • memory/2756-187-0x0000000002FC0000-0x0000000002FD0000-memory.dmp

      Filesize

      64KB

    • memory/2756-188-0x0000000002FC0000-0x0000000002FD0000-memory.dmp

      Filesize

      64KB

    • memory/2756-189-0x0000000002FC0000-0x0000000002FD0000-memory.dmp

      Filesize

      64KB

    • memory/4664-146-0x0000000000401000-0x000000000042F000-memory.dmp

      Filesize

      184KB

    • memory/4664-139-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4664-140-0x0000000000401000-0x000000000042F000-memory.dmp

      Filesize

      184KB

    • memory/4664-141-0x0000000001B50000-0x0000000001E9A000-memory.dmp

      Filesize

      3.3MB

    • memory/4664-142-0x00000000017D0000-0x00000000017E0000-memory.dmp

      Filesize

      64KB

    • memory/4664-145-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB